• Title/Summary/Keyword: Dissemination Network

Search Result 190, Processing Time 0.029 seconds

Traffic Congestion Estimation by Adopting Recurrent Neural Network (순환인공신경망(RNN)을 이용한 대도시 도심부 교통혼잡 예측)

  • Jung, Hee jin;Yoon, Jin su;Bae, Sang hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.67-78
    • /
    • 2017
  • Traffic congestion cost is increasing annually. Specifically congestion caused by the CDB traffic contains more than a half of the total congestion cost. Recent advancement in the field of Big Data, AI paved the way to industry revolution 4.0. And, these new technologies creates tremendous changes in the traffic information dissemination. Eventually, accurate and timely traffic information will give a positive impact on decreasing traffic congestion cost. This study, therefore, focused on developing both recurrent and non-recurrent congestion prediction models on urban roads by adopting Recurrent Neural Network(RNN), a tribe in machine learning. Two hidden layers with scaled conjugate gradient backpropagation algorithm were selected, and tested. Result of the analysis driven the authors to 25 meaningful links out of 33 total links that have appropriate mean square errors. Authors concluded that RNN model is a feasible model to predict congestion.

Curatorial Methods of Net Art (넷아트 큐레토리얼 방법론)

  • Lim, Shan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.155-160
    • /
    • 2022
  • This paper intends to focus on the practical activities and historical significance of network art, that is, 'net art' as an artistic form that depends on network technology. This is because the appearance of net art, which constructs a new interactive art that cooperates and exchanges with each other beyond the boundaries of time and space, can be a contemporary alternative in overcoming the limitations of traditional art. Another important research area to be considered in this paper is net art curating, as well as considering the significance of net art in art history. As new media art that is defined as a 'process' rather than a complete object, net art is a digital art that requires functions such as aesthetic appropriation, dissemination, and mediation performed online, unlike physical presentations with high perfection in exhibition halls. It is accompanied by a new social and cultural curatorial. This appearance requires both artists and curators to reorganize the strategy that net art curating in technoculture should have. Therefore, this paper attempts to question the creative strategies of net art in the wave of globalization in the 21st century, and to examine the artistic meaning and critical value of the experimental net art curatorial method that emerged through the realm of new technology and media. For this purpose, this paper demonstrated key examples of net art works and exhibition projects that started with Fluxus in the 1960s and are spreading all over the world in the 2000s.

Query Optimization with Metadata Routing Tables on Nano-Q+ Sensor Network with Multiple Heterogeneous Sensors (다중 이기종 센서를 보유한 Nano-Q+ 기반 센서네트워크에서 메타데이타 라우팅 테이블을 이용한 질의 최적화)

  • Nam, Young-Kwang;Choe, Gui-Ja;Lee, Byoung-Dai;Kwak, Kwang-Woong;Lee, Kwang-Yong;Mah, Pyoung-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.1
    • /
    • pp.13-21
    • /
    • 2008
  • In general, data communication among sensor nodes requires more energy than internal processing or sensing activities. In this paper, we propose a noble technique to reduce the number of packet transmissions necessary for sending/receiving queries/results among neighboring nodes with the help of context-aware routing tables. The important information maintained in the context-aware routing table is which physical properties can be measured by descendent nodes reachable from the current node. Based on the information, the node is able to eliminate unnecessary packet transmission by filtering out the child nodes for query dissemination or result relaying. The simulation results show that up to 80% of performance gains can be achieved with our technique.

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.

Personalization Recommendation Service using OWL Modeling (OWL 모델링을 이용한 개인 추천 서비스)

  • Ahn, Hyo-Sik;Jeong, Hoon;Chang, Hyo-Kyung;Choi, Eui-In
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.309-315
    • /
    • 2012
  • The dissemination of smartphones is being spread and supplementary services using smartphones are increasing and various as the Mobile network and device are developing rapidly, so smartphones that enables to provide a wide range of services is expected to receive the most attention. It makes users listen to music anytime, anywhere in real-time, use useful applications, and access to Internet to search for information. The service environment is changing on PC into Mobile due to the change of the circumstance mentioned above. these services are done by using just location information rather than other context, and users have to search services and use them. It is essential to have Context-aware technology for personalization recommendation services and the appropriate representation and definition of Context information for context-aware. Ontology is possible to represent knowledge freely and knowledge can be extended by inferring. In addition, design of the ontology model is needed according to the purposes of utilization. This paper used context-aware technologies to implement a user personalization recommendation service. It also defined the context through OWL modeling for user personalization recommendation service and used inference rules and inference engine for context reasoning.

Coast Evaluation Techniques for Mode Selection in Video Coding (동영상에서 모드 선택을 위한 코스트 평가 방법)

  • Song, Dae-Geon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.275-280
    • /
    • 2013
  • Recently, access networking BroadBand the high performance of the video equipment to the Internet via voice, video, multimedia services, such as dealing with the media information dissemination is becoming increasingly attracting attention. More video devices and network environments in the future to keep pace with the high-quality video using the form dealing with an increasingly diversified and shall utilization is expected. Among them, video encoding technology, image compression encoding technology of information technology is one of the central role. Video coding technology that requires a vast amount of information contained in the video signal and the appropriate amount of information to eliminate redundancy as the efficiency of the digital code representing video signal is developed as a technology is going. Therefore, this study applied to video coding mode selection in the cost evaluation methods to examine and to maximize the coding efficiency and the proposed method compared to the conventional method was confirmed excellence.

A Mobile OS Integrity Verification Using Bootloader & Physically Independent Storage Device (부트로더와 물리적으로 독립된 저장장치를 이용한 모바일 운영체제 무결성 검증)

  • Park, Jae-Kyung;Lee, Sang-Hun;Kwon, Mi-Young;Kim, Hyo-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.123-132
    • /
    • 2014
  • In this paper, we study the verification techniques for OS integrity that can be more fatal than applications in case of security issues. The dissemination of smartphones is rapidly progressing and there are many similarities of smartphones and PCs in terms of security risks. Recently, in mobile network environment, there is a trend of increasing damages and now, there are active researches on a system that can comprehensively respond to this. As a way to prevent these risks, integrity checking method on operation system is being researched. As most integrity checking algorithms are classified by verification from the levels before booting the OS and at the time of passing on the control to the OS, in which, there are minor differences in the definitions of integrity checking or its methods. In this paper, we suggests the integrity verification technique of OS using a boot loader and a physically independent storing device in the mobile device.

Energy-efficient Data Dissemination Scheme via Sink Location Service in Wireless Sensor Networks (무선 센서망에서 위치정보 선제공 기법을 이용한 에너지 효율적인 데이타 전달방안)

  • Yu, Fu-Cai;Choi, Young-Hwan;Park, Soo-Chang;Lee, Eui-Sin;Tian, Ye;Park, Ho-Sung;Kim, Sang-Ha
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.240-243
    • /
    • 2007
  • Geographic routing has been considered as an efficient simple, and scalable routing protocol for wireless sensor networks since it exploits pure location information instead of global topology information to route data packets. Geographic routing requires the sources nodes to be aware of the location of the sinks. In this paper, we propose a scheme named Sink Location Service for geographic routing in wireless Sensor Networks, in which the source nodes can get and update the location of sinks with low overhead. In this scheme, a source and a sink send data announcement and query messages along two paths respectively by geographic routing. The node located on the crossing point of the two paths informs the source about the location of the sink. Then the source can send data packet to the sink by geographic routing. How to guarantee that these two paths have at least one crossing point in any irregular profile of sensor network is the challenge of this paper.

  • PDF

Performance Analysis of coverage probability according to transmission range of devices (단말의 통신 반경 변화에 따른 포함 확률 성능 분석)

  • Han, Seho;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1881-1886
    • /
    • 2016
  • In this paper, by using D2D communications that perform direct communications among devices within small transmission range of each device without base station, we assume that a device generates and transmits data packets to other proximate devices and the devices which receive the data packets relay those to other adjacent devices. To maximize the total number of devices which successfully receive data packets, Epidemic routing protocol is considered in this paper. In Epidemic routing protocol, all devices which received data packets try to relay the packets to other adjacent devices. We assume various network environment where devices are densely distributed in specific area(crowded area). In this environment, D2D SD can be a source node and D2D devices can be relay nodes. By setting transmission range of D2D SD and D2D devices as parameters, we analyze performance results of coverage probability of Epidemic routing protocol through intensive simulations.

The Effect Analysis of One-side Walking Behavior Using MDPM(Multi-directional Pedestrian Model) (다방향보행자모형(MDPM)을 이용한 편측보행 효과분석)

  • Lee, Jun;Cho, Han-Seon;Hyun, Kyung;Chung, Jin-Hyuk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.5
    • /
    • pp.151-159
    • /
    • 2009
  • Network models for pedestrian flows have been studied in various ways. However, because of the simplicity and application, a number of researchers prefer the CA Model to analyze pedestrian's complicated behavior. These kinds of models based on Agent are being used as a microscopic analyzing method since it can easily adapt individuals' various characters and movement types. However, because pedestrians' movement can be (easily) effected by where they are and where they head, some models using the same rules have limit when considering pedestrians' every different movement. In this research, homogeneous section is defined as a similar movement type of individuals. With MDPM, we suggest simulation method explaining one-way walk and side-walk which could not be done in past.

  • PDF